Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Most of the existing ontology development toolkits are not catered towards `casual web ontology development', a notion analogous to standard web page development. Key feature...
Aditya Kalyanpur, Nada Hashmi, Jennifer Golbeck, B...
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Abstract. Several ontology building methodologies have been developed endowed with different characteristics, however there is not yet a clear method to select the most appropriate...
Michela Chimienti, Michele Dassisti, Antonio De Ni...
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...